IPS Policy Signatures Main Page Fields
Use the IPS Policy Signatures main page to get an overall, high-level view of your IPS signature settings. You can filter and sort this information to get a better understanding of what you want to configure. Table 1 describes the fields on this page.
Table 1: IPS Policy Signatures Main Page Fields
Field | Description |
---|---|
Name | Name of the IPS signature. |
Age of attack | Age of the attack (in years) to be used as a filter criteria to include IPS signatures as part of the dynamic group. |
CVSS-Score | Common Vulnerability Scoring System (CVSS) to be used as a filter criteria to include IPS signatures as part of the dynamic group. |
File Type | File type of the attack to be used as a filter criteria; for example, flash. |
Vulnerability Type | Vulnerability type of the attack to be used as a filter criteria; for example, overflow. |
Severity | Severity level of the attack that the signature will report. |
Category | Category of the attack objects. |
Object Type | Objects that are used in defining IDP policy rules. |
Recommended | Predefined attacks recommended by Juniper Networks to the dynamic group. |
Action | An IPS signature action taken when the monitored traffic matches the attack objects specified in the rules. |
Pre-defined/Custom | Detected known attack patterns and protocol anomalies within the network traffic. |
Domain | Domain name of security device. This information is auto-populated once you select the device. For example: global, system. |